A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software. The term rootkit is a compound of "root" (the traditional name of the privileged account on Unix-like operating systems) and the word "kit" (which refers to the software components that implement the tool). The term "rootkit" has negative connotations through its association with malware. Rootkit installation can be automated, or an attacker can install it after having obtained root or administrator access. Obtaining this access is a result of direct attack on a system, i.e. exploiting a vulnerability (such as privilege escalation) or a password (obtained by cracking or social engineering tactics like "phishing"). Once installed, it becomes possible to hide the intrusion as well as to maintain privileged access. Full control over a system means that existing software can be modified, including software that might otherwise be used to detect or circumvent it. Rootkit detection is difficult because a rootkit may be able to subvert the software that is intended to find it. Detection methods include using an alternative and trusted operating system, behavioral-based methods, signature scanning, difference scanning, and memory dump analysis. Removal can be complicated or practically impossible, especially in cases where the rootkit resides in the kernel; reinstallation of the operating system may be the only available solution to the problem. When dealing with firmware rootkits, removal may require hardware replacement, or specialized equipment. (Wikipedia).
This is a video response to RootBerry Sound Effect Contest. I've been able to do this sound since I was a kid and I've never met anybody else who could do it... Anyway, forgive me for that. ;~)
From playlist Other...
This is a video response to RootBerry Sound Effect Contest. I saw a man who could play music like that. I'm not that good, though. Anyway, forgive me for that. ;~)
From playlist Other...
What is Agile Scrum? Learn in 16 minutes in this introduction to scrum video. Scrum is a framework for managing work with an emphasis on software development. It's a subset of Agile. Video by Agile Coach Chris Gagné: https://chrisgagne.com/ - Learn to code for free and get a developer j
From playlist Tutorials
WebAssembly: The What, Why and How
WebAssembly is a portable, size, and load-time efficient binary format for the web. It is an emerging standard being developed in the WebAssembly community group, and supported by multiple browser vendors. This talk details what WebAssembly is, the problems it is trying to solve, exciting
From playlist Talks
Introduction to the C programming language. Part of a larger series teaching programming. See http://codeschool.org
From playlist The C language
How to Build a KeyLogger in C++ | Introduction | #C | #programming
Don’t forget to subscribe! This project series is about creating a Keylogger in C++. A KeyLogger is a program that can capture every key or click that is pressed on the computer asynchronously. In order to get useful information, we will learn how to erase the cache, build the keylogger
From playlist Build A KeyLogger In C++
An intro to the core protocols of the Internet, including IPv4, TCP, UDP, and HTTP. Part of a larger series teaching programming. See codeschool.org
From playlist The Internet
Introduction to the C programming language. Part of a larger series teaching programming. See http://codeschool.org
From playlist The C language
How To Detect Rootkits On Kali Linux - chkrootkit & rkhunter
Hey guys! HackerSploit here back again with another video, in this video, we will be looking at how to check for rootkits on Kali Linux or any other Linux distribution. A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively
From playlist Ethical Hacking & Penetration Testing - Complete Course
DEFCON 13: Surgical Recovery from Kernel-Level Rootkit Installations
Speaker: Julian Grizzard Conventional wisdom states that once a system has been compromised, it can no longer be trusted and the only solution is to wipe the system clean and reinstall. This talk goes against the grain of conventional wisdom and asks are there more efficient ways to repa
From playlist DEFCON 13
Linux Defense Evasion - Apache2 Rootkit
In this video, I demonstrate the process of establishing persistence and evading defenses on Linux through the use of an Apache2 rootkit. //LINKS Apache2 Rootkit: https://github.com/ChristianPapathanasiou/apache-rootkit //PLATFORMS BLOG ►► https://bit.ly/3qjvSjK FORUM ►► https://bit.ly
From playlist Red Team Fundamentals
DEFCON 18: This is Not the Droid You're Looking For 2/3
Speakers: Nicholas J. Percoco, Christian Papathanasiou Android is a software stack for mobile devices that includes an operating system, middleware and key applications and uses a modified version of the Linux kernel. 60,000 cell phones with Android are shipping every day. Android platf
From playlist DEFCON 18-2
Source Boston 2010: Managed Code Rootkits: Hooking into Runtime Environments 5/6
Clip 5/6 Speaker: Erez Metula This presentation introduces an underestimated threat of application level rootkit attacks on managed code environments, enabling an attacker to change the language runtime implementation, and to hide malicious code inside its core. We'll be covering generic
From playlist SOURCE Boston 2010
CERIAS Security: An Alternate Memory Architecture for Code Injection Prevention 3/4
Clip 3/4 Speaker: Ryan Riley · Purdue University ode injection attacks, in their various forms, have been in existence and been an area of consistent research for a number of years. A code injection attack is a method whereby an attacker inserts malicious code into a running computing sy
From playlist The CERIAS Security Seminars 2009
Source Boston 2010: Managed Code Rootkits: Hooking into Runtime Environments 1/6
Clip 1/6 Speaker: Erez Metula This presentation introduces an underestimated threat of application level rootkit attacks on managed code environments, enabling an attacker to change the language runtime implementation, and to hide malicious code inside its core. We'll be covering generic
From playlist SOURCE Boston 2010
DEFCON 14: Oracle Rootkits 2.0
Speaker: Alexander Kornbrust, Founder & CEO, Red-Database-Security GmbH Abstract: In 2006 thousands of people will create applications based on the free Oracle 10g Express Edition. Even if this version of Oracle (based on Oracle 10g Rel. 2) is the most secure database from Oracle out of t
From playlist DEFCON 14
DeepSec 2009: The Kingdom of the Blind: OS X Incident Response
Thanks to the DeepSec organisation for making these videos available and let me share the videos on YouTube. Speaker: Morgan Marquis-Boire Morgan Marquis-Boire explains what he learnt from OS X incident response, security issues and malware running on OS X (yes, there is malware for OS
From playlist DeepSec 2009
HAR 2009: Runtime Kernel Patching on Mac OS X 1/5
Clip 1 Speaker: Bosse Eriksson This talk will focus on rootkit development on Mac OS X. It will cover the basics as well as a couple of (somewhat) new tricks. We will also talk about rootkit detection on Mac OS X. For more information go to: https://har2009.org/program/events/169.e
From playlist Hacking at Random (HAR) 2009
DesmosLIVE: An Exploration of Desmos + Mathalicious
Kate Nowak of Mathalicious explores a few Mathalicious lessons with Desmos
From playlist Desmos LIVE